April 2010

04/16/2010

ABSOLUTE PURITY: THE END OF UNFAIRNESS

ABSTRACT

If you think that we can lead to a society which is free from lies and different acts of unfairness, then take a pause and read this paper.

This paper examines various unfair scenarios which are still possible in complete multimedia recordings and proposes personalized regular lie detection / brain mapping tests for individuals as solution.

It is suggested to read the paper [Complete Multimedia Recording -Samir] prior to reading this paper.

LEGAL DISCLAIMER

Opinions expressed in this paper are individual opinions of the author. Information/scenarios provided are used as sample. Any match/resemblance with any entity / individual might be just coincidence, author cannot be held responsible for that. Readers use the information given in this paper at their own risk. Author is not liable to any damage/consequence which might be caused by the information/content given in this paper.

DEDICATION

This work is dedicated to author's annonymous child hood friend whom author failed to understand.

IPR Declaration and Copyright Notice

Author is pursuing IPR(s) for some of the ideas described in the paper.

Contents in this paper are copyright protected. All rights are reserved.

Entities and people who need to reproduce in any media (such as print or electronic), please contact srivastava_samir at hush dot com

1) Unfair Scenarios:

Below various unfair scenarios are described. Most of the scenarios are due to more than one meaning of set of statements of any language. These unfair scenarios are possible in complete multimedia recordings also.

1.1)Lies

Persons might understood/acted on the meaning “X” of the statements. But when inquired about the meaning understood, they can tell that they undestood meaning “Y” of the statements. Moreover they are free to perform action driven from meaning “X” of the statements. For action taken due to meaning “X” of the statements, they might further say that they took the action due to various reasons, such as driven by intitution or by hit and trial method.

One might be thinking about “X” but says that one is thinking about “Y”. This scenario can exist even if statements are going to have single meaning only.

1.2)Provocation to commit a mistake

Person A might provoke person B to commit a mistake. Person A does the things which person B never likes. Person B repeatedly tells person A not to do those things. But person A says that it is done by accident/coincidence whereas internally person A is doing it intentionally to provoke person B to commit a mistake. Person B commits the mistake and person A is successful. For this mistake person A should be responsible too, but there is no proof. For example, person B is asking something from person A which is on the computing device of A. Person A keeps avoiding it. Person A leaves the computing device open. Person B looks into the computing device of A and gets the things. Both were friends and sharing the things till that point of time. Here Person B can be charged for theft and person A says that he didn't do anything intentionally. There is no proof of mental game of person A. Ideally person A should be charged also.

1.3) Male / Female Relationships

Author is of the opinion that god has created male and female in pair and there is one soulmate. Males/females get attracted to each other naturally in the life. But one of them gets lust for something else and walks out of that relationship. This opens up life long search for absolute love. When partners start looking for absolute love in marriage, then it causes unsatisfaction which gives birth to various domestic issues. There are other unfair mental activities such as virtual rape.

2. Solution :

The unfair mental activity is unchecked by CMR (Complete Multimedia Recordings) as described with the help of different scenarios in section 1 . Sowhat is the solution of cheating mentally scenarios ?

We can fix the language for not containing the more than one meanings of the statements. This is near to impossible as languages are deeply rooted in genes and humans understand sweet, sour, lie etc from very early baby age itself.

We can make laws for specifying clearly one meaning of statements. Parties engaged in conversation can be made responsible for deriving one meaning clearly without any other meaning inferred from the statements. As CMR will be in place, parties can be held responsible for not abiding by the law. This avoids most of the scenarios. But it still leaves the scenarios such as “One is thinking X, but tells Y”; “actions committed by provocation” etc.

In author's opinion, we need periodic lie detection/brain mapping tests personalized for individuals based on CMR. Brain Mapping / Lie Detection tests can be done on the demand of the other parties. Questions can be like “Did you feel jealous about someone?”; “Did you virtually rape anyone?”; and “Did you tell a lie, if yes due to what reasons?” etc. Negative thoughts give birth to negative actions. Author is proposing to check negative thoughts itself. Whenever one gets negative thoughts, one can indulge in other physicalor mental activities to avoid the chain of negative thoughts building in the brain. As one has to go through personalized brain mapping/lie detection tests on the negative thoughts, one has to adhere to this. Outcome of brain mapping/lie detection tests will be attributed to purity-level defined in [Complete Multimedia Recordings -Samir] also.

As people cannot tell lie about the love and their realization of soul mate connection, there will be love in families. It will end frustration/tension etc due to domestic issues. CMR with personalized lie detection/brain mapping tests address the issue at the grass root level.

CMR provide freedom from the negative actions. But CMR with personalized brain mapping/lie detection tests provide freedom from negative thoughts itself. When everyone understands the importance of this and practices to attain the absolute purity, then negtive thought avoidance will be passed via inheritance in genes and there will be generations which will be free from negative thoughts and that will be end of Kaliyug.

3) Reason For Adoption:

Regulatory bodies will announce a point in time, after which lie detection/ brain mapping test will be mandatory within a geographic region. Regulatory bodies will encourage people to go through these tests and provide enough time for development of corrective thought process.

People will realize that time is wasted in negative thoughts for which they cannot take negative action, as they are under CMR. People will also realize that it is better to save time and thoughts for good things.

As everyone wants to be good; the provided SINGLE point of time migration plan will make everyone to become advocate of this change.

4) Conclusion:

The mental fairness will increase in the society as the degree of lie detection/brain mapping tests and sharing of its results will increase. Complete Multimedia Recordings along-with brain mapping/lie detection tests will liberate us from any kind of unfairness and will increase degree of love. Instead of addressing unfairness, domestic issues at the surface by different laws, we need to address them at birth/building of those negative thoughts itself.

Author would like to request the readers to voice their opinion to their representatives in regulatory bodies for the proposed change and various polling agencies and news channels to poll the public opinion on the proposed change.

04/13/2010

If you think that we can lead to a society which is free from different acts of unfairness, white collar terrorism and complex laws, then take a pause and read this paper.

This paper examines various unfair scenarios which are still possible in the cashless economy. We have been amending the laws since ages, but we are still not able to fix them. Privacy is misused in various unethical/unfair activities. Afterwards evidences and witnesses are manipulated and holes in the existing laws are exploited to let the (influential) cheaters to go scot free.

This paper suggests complete multimedia recording for everyone as a solution, as one cannot do wrong on the public forum i.e. when one knows that one is being watched. Complete multimedia recording will make society fairer and put full stop on the ever increasing complexity of laws for plugging the holes created by lawyers.

It is suggested to read the paper [Cashless Economy - Samir] prior to reading this paper.

LEGAL DISCLAIMER

Opinions expressed in this paper are the individual opinion of the author. Information/scenarios provided are used as sample. Any match/resemblance with any entity / individual might be just coincidence, author cannot be held responsible for that. Readers use the information given in this paper at their own risk. Author is not liable to any damage/consequence which might be caused by the information/contents given in this paper.

DEDICATION

This work is dedicated to anonymous best person author has interacted so far. That person helped author to get out of the biggest loss of his life. This person has been most honest and balanced person author has met so far.

IPR Declaration and Copyright Notice

Author is pursuing IPR(s) for some of the ideas described in the paper.

Contents in this paper are copyright protected. All rights are reserved.

Entities and people who need to reproduce to other places in any media (such as print or electronic), please contact

srivastava_samir at hush dot com

1) Definition/Need of Laws:

Laws came into existence to enforce the people to good. Laws are made to provide equal rights for everybody. Laws provide sense of security to people, as others cannot perform unfair actions to them. Only laws protect individuals from unfair activities done by others. Laws define the legal / illegal activities. Laws require the evidences and/or witnesses to prove anyone guilty.

Laws require any witness to tell the truth. But witnesses tell huge lies in the court under the oath. There is very long judicial process in different geographic regions. We have reached to limit, where telling lie should be made the law and people should have several lives for punishment / damage claim!!!!

2) Problems with Existing Laws / Unfair Scenarios:

Various unfair scenarios are described further. These scenarios are possible in cashless economy as described in [Cashless Economy - Samir] also. They don’t yield in earnings directly. In these scenarios, loss of victim is the gain of the cheater(s). These are not like tracing the funding of terrorism. Moreover these scenarios use the holes in the existing laws of the various geographic regions to cheat within legal limits and mostly it is difficult to prove entity/person guilty in the court of law. Sometimes existing agreements are placed such that damage caused cannot be even claimed or damage caused can be claimed merely to a fraction of a percentage of the damages caused. Laws have been (re)defined/amended in the never ending cycles, as below scenarios depict the holes in the current state of laws. As per author’s research over the internet, Sumerians wrote the first code of laws. The first written legal code was enacted around 2100-2050 BC. It is left for readers to figure out amendments done in the various laws since their inception.

In a gang of cheaters, loss of victim can be passed/shared using different transitive/ conduit parties in between. For example, person who cheats directly the victim by different means (such as stealing the confidential information of project) is offered a seat in educational institution for his/her kid, and person offering a seat in educational institution is awarded with some projects. Party awarding the projects might be compensated via some other benefits such as stocks via the board seat of high growth company. This is within the limits of existing laws and proving the connection is difficult as person admitted might be knowing the exact answers for the questions asked, awarding project to anyone is within the sole discretion of the party awarding the project, offering anyone the board seat needs the approval from the existing board of directors of the company only which is solely their right. Here loss of victim is gain of the competing company, where it used the “other means” to cheat the competitor within the legal limits.

Influential persons can use given sample scenarios in this paper to their advantage. Author is of the opinion that white collar terrorism will be more common in Soft Earning Unit Environment, if complete multi-media recording is not adopted(refer section 3 solution).

2.1) Unauthorized Access to Communication:

Telephonic conversation can be heard in an unauthorized way using jumpers in the MDF (Main Distribution Frame). What’s the guarantee that closed wireless service provider wouldn’t hear the conversation and leak it using word of mouth. Communication done via HTTPS (Hyper Text Transfer Protocol –Secure used for communicating securely using internet) with different entities can be leaked using word of mouth by the personnel employed by the entity maintaining HTTPS server. The high speed modem installed on the victim’s premises can be compromised too. It’s difficult to prove who compromised the modem or who leaked the information using “word of mouth”.

Communication sent via the postal mails in the paper form can be leaked too by different entities. Once the address of the victim is known, then gang of cheaters can track the communication in paper form sent via either regular postal service or private carrier. Other party leaks the information regarding the confidential projects using “word of mouth” to the gang of cheaters.

The search/web traffic of the victim can be leaked by different providers such as search service provider, internet service providers etc.

Usage of the rented phones, internet access via public places can be tracked if victim’s credit card information, physical (MAC –Media Access Control) address of computing devices being used and other accessibility information etc are known to the gang of cheaters.

Moreover, victim might be having COMPLETE caller ID blocking from the communication service provider. Communication service provider doesn’t hide the caller ID and different bodies are instructed to provide the inaccurate/incomplete information to victim. If victim abides by that information, victim looses major rights for confidential projects. It’s near to impossible for the victim to know about this kind of behavior timely.

Information gathered via tapping any form of communication can be misused to victim’s disadvantage in various ways by gang of cheaters.

2.2) Identity Theft:

Identity theft will still exist in the cashless economy. Bad fellows might pretend someone else and commit unfair activities on their behalf. For example, gang of cheaters might get access to victim’s credit card information using various sources and use it to charge their own expenses. Credit card issuing companies might reject the disputed charges if these charges are charged to business entities where victim regularly uses the credit card, even if they are not used within the same (sub) geographic region where victim used the card.

There are various ways to learn the unique identifier (Social Security Number i.e. SSN in US, Tax Identifier in other geographic regions) of the victim. For example some financial institutions ask to punch the FULL SSN on the phone calls, some financial institutions report the FULL SSN on the each statement sent via mail which does not have any proof of delivery. Details provided in 2.1 can be used to learn the SSN etc of the victim.

Once gang of cheaters get access to unique identifier, credit card numbers etc of the victim, they can even track various activities such as the change of the communication service provider for victim’s disadvantage.

Bad fellows might commit a crime in a geographical region and using fake travel document run away from that geographic region. Existing international/bilateral laws are complex and sometimes with bad intentions/political compulsions these laws are exploited such that guilty is never punished.

2.3) Manipulation of Existing Security Devices/Mechanisms:

Security devices from security service provider are remote operated. They can be configured to work with other remotes which are not in the control of the victim. More seriously, this can be used to learn the key etc of the safe box etc from the victim’s place in his/her absence. Even Safe box provider can leak that victim has opened a safe box using word of mouth. Remote operated garage securing devices can be configured for multiple remotes too to enter the victim’s house. Key code of the manual locks can be learnt via the lock installer too. How many people can install dead bolt locks etc by themselves? Once cheaters has access to communication of the victim, they can know which lock installer/service personnel is visiting and learn the details via him/her.

2.4) Unauthorized Access to Victim’s Activities:

Gang of cheaters can put the hidden cameras on the victim’s living area to learn the activities of the victim. Gang of cheaters can even misuse the GPS (Global Positioning System) technology. Hidden GPS device can be placed on the vehicle to learn the potential meeting places/partners. Information learnt can be used by gang of cheaters in many ways. For example, in the back of scene, potential business partners might be pressurized to get the information from the victim in the initial meetings and then share it with gang of cheaters and/or not to work with victim. It results in wastage of time etc on the victim’s part which results in gain of the cheaters. It should be noted that in various geographic regions, we don’t have public transport in all of the places. Usage of rented vehicle may not be possible, as renting companies require the credit card and with the initial transaction (which is of the hold in nature), gang of cheaters can know about the rented vehicle and that vehicle can be compromised too. Usage of cab may not be possible, as for hiring the cab either one has to make a call to cab company or visit the cab company.

By using the holes in operations of the security devices/locks etc as described in 2.3 along-with tracking of the victim’s movement, gang of cheaters can learn the secret projects worked by the victim in his/her absence.

2.5) Credit Card /Magnetic Strip Card Laws:

Credit card company can lower the credit limit of the victim when an important transaction is about to happen. Victim submits the credit card information to the payee, before payee processes the transaction, limit is lowered. Transaction is declined. As per the existing laws/agreements of the payee, the important transaction fees is not paid in time and transaction etc is nullified. It is difficult to prove in the court of law whether lowering of limit is done intentionally by the credit card issuing company. This is within the existing laws of the credit card issuing companies; here law can be misused to victim’s disadvantage.

2.6) Cheating Partners:

Partners cheat their fellow partners and maintain various extra marital affairs. When they are questioned by their partners, they tell big flat lies. It is difficult to prove, if extra marital affair doesn’t result in babies and other evidences are destroyed / manipulated in the absence of partner. This gives birth to frustration, trauma, depression and emotional crimes. We have DNA (Deoxyribonucleic acid) test for it but it doesn’t avoid it. DNA tests give birth to abuses for kids of the extra marital affairs, which is not fair for the kids where kids get punished for the mistakes of the elders.

2.7) Prostitution:

During the paper [Cashless Economy - Samir], author felt that traceability provided by Soft Earning Unit will fix this. But it will exist when offered sexual pleasure is attached with something else. For example, a store might sell the goods at the market competitive price, but its employees offer the sexual pleasure there itself as a bonus to increase the sales.

2.8) Foul Play by Law Keepers:

In the existing system, law keepers also play the foul game. Traceability of Soft Earning Unit will help in containing these cases. But even in Soft Earning Unit environment, it is possible them to play the foul game; as law keepers can also become the party of sharing the damage of victim in different form.

Sometime law keepers don’t collect the complete evidence and statement of witnesses. Sometimes law keepers intentionally manipulate it. Sometimes judiciary also plays within the limits of the laws for different things such as court dates and contents of court orders etc. The volume of practice varies in different geographic regions.

Any law can be misused even in Soft Earning Unit environment. For example, in the countries like India, the dowry prevention law is now being misused by the females. Refer www.498a.org for various details.

2.9) Complex Laws are best tools for Cheating Lawyers:

How many common persons know about the details of laws of different geographic regions? With travel etc involved in different jobs, it is difficult for the common person to know the laws of the different geographic regions. For example, in some geographic regions, there is provision of anticipatory bails, whereas some don’t have the provision for this. How many common persons know about even approaching the bar council, in case they are not able to find a lawyer to take his/her case? How many persons know about the time limit for a lawyer/bar council to respond? Legal advice provided untimely is useless for victim.

If victim’s lawyer shook hands with cheaters and victim’s communication channels are tapped in an unauthorized way along-with vehicular movement, then it is near to impossible for the victim to get even proper legal advice timely.

2.10) PGP with key loggers and modem manipulation:

The most trusted privacy/confidential tool PGP (Pretty Good Privacy) can be compromised with key loggers. Compromised modem along with key loggers can be used to divulge the sensitive information. It’s difficult to prove who did that. Programs/Services from different providers are offered with such agreements in place that even if someone can prove that key logger is installed with their program, one cannot claim the complete damage caused by the entity responsible for key loggers.

2.11) Laws of Standard bodies for IPR:

This is one of the most sophisticated white collar acts of cheating legally. Existing laws only require (co)author of the proposed change/draft to declare the known IPRs. One can sit silently in the meetings of the standard bodies and get the standards developed according to their IPRs. Once standards are developed and used, then they run after with IPRs.

First big vendors let the base line of standards developed and once community is pregnant with it, then they start building IPR portfolio. Why don’t they tell at the first stage itself about their intentions? Why doesn’t security come as free as IP header?What would have been the situation if IP header would have been patented? It is difficult to prove that participants sit silently intentionally in the meetings as per the advice of legal experts. Author is of the opinion that all readers of the specifications should declare IPR in process at least. As standards are developed in community, therefore standards along-with their usage should be free from patents.

3) Solution:

As described with the help of different scenarios in section 2, any technology can be misused by gang of cheaters. Various scenarios show that there are still holes for the influential person to cheat legally. It is evident from the never ending amendments to laws, that laws of humans have never been COMPLETE. Lawyers always find holes in the existing laws for their influential clients to cheat within legal limits.

Author is of the opinion, whenever in a community law makers/lawyers start misusing the laws to their advantage that community is bound to fall flat sooner or later. For example, Rome wasn’t built in a day, but it started declining when czars started misusing the laws to their advantage.

What is the solution?

Complete multimedia recording is needed for everybody. Can anyone do anything WRONG on a PUBLIC FORUM? Everybody understands very well the difference between fair and unfair before committing any unfair action. Author proposed the complete multimedia recording for addressing the case of consumption in [Cashless Economy - Samir] paper. Author is now proposing that we need it for addressing the above mentioned unfair scenarios too.When we have complete multi-media recording, we will not need the cycles of complex laws for any new technology too. In the complete multimedia recording for everyone adopted geographic region(s), whenever anyone tries to commit any unfair action such as described in section 2, individual/entity will be caught right away in the multimedia recordings somewhere. Attempted tampering of the evidences and influencing of witnesses will be caught too.

Currently wire tapping by different entities is done selectively after getting approval from regulatory bodies. In the existing wire tapping, communication is sent to regulatory bodies by access service provider or other network service provider. This wire/communication tapping is not done always. Complete multimedia recording for everyone within the geographic region is proposed here.

Moreover, complete multimedia recordings will avoid the scenarios of back biting in humans. People waste lot of energy and time in finding the truths etc said by different persons on their back. With complete multimedia recordings, there will be always record of statements given by humans. It will save human energy and time for more productive work.

Complete multimedia recording will require a placement of home gateway along-with different cameras in each living area. In the open space such as long roads (without traffic signals), playing fields etc, we might use the satellites to capture the video of the happenings. Author proposes that everybody will be carrying their mobile computing device(s) such as cell phones always. These devices will be upgraded for capturing the multimedia recordings of the surroundings always. In some use cases, these recordings might be encrypted multiple times using any mechanism such as different PGP keys. When all keys are provided, then only they can be decrypted.

In the proposed solution, one might be sharing one’s recordings data with someone else. Author is of the opinion that privacy is needed only when one is in intimacy with partner or in the bathroom. Some people might share it this too. Sharing of one’s different recordings data with someone else might be referred as “purity-level” of the concerned person. For example person with highest level of purity might share all of recordings data with someone else.

Author is of the opinion that we might not need encryption when everybody is under complete multimedia recordings, as anyone who tries to access the recordings which one should not be accessing will be caught somewhere in the multimedia recordings. Usage of unauthorized recordings can be found by different means such as usage of the information learnt, behavioral change etc. When one cannot use the information learnt in an unauthorized manner, then one will not be wasting efforts to learn the information from someone else recordings, which one should not be doing. Even if there are cases of unauthorized access to recordings, then regulators will trace the recordings of the suspected entity on the complaint of users.

Author is of the opinion that as everybody will know that they cannot misuse privacy and manipulate the evidences and witnesses, nobody will be committing any unfair action. As unfair actions will be avoided, then we will not need complex laws.

With traceability provided by Soft Earning Units, it will be easier for the influential persons to misuse the earnings and spending information of individuals/entities for their advantage. It might be difficult to prove party responsible for leaking any sensitive information using word of mouth as guilty in the court of law. Therefore, author is proposing that complete multimedia recording at least for influential persons (such as persons with above certain amount of wealth, heads of organization, decision makers in various bodies, persons in judiciary, law keepers, earning keepers for Soft Earning Units, persons working in media etc) should be in place along with cashless economy.

4) Reason for Quick Adoption by People:

Regulators will announce a point in time, when complete multi-media recordings will be adopted in a geographic region for everyone. In a geographic region for testing the system, initially we might have complete multi-media recordings based on different criterion such as for influential persons. After verification of the system, we will extend it for everybody. After announced point of time, everybody within that geographic region will be under complete multi-media recordings. As everybody wants to be fair and honest; the provided SINGLE POINT of TIME migration plan will make everybody to become advocate of this change.

5) Conclusion:

The fairness in society will increase as the degree of multi-media recordings and its sharing with others will increase. Complete multimedia recordings for everyone will liberate us from complex laws and white collar terrorism. Instead of investing in amending the laws at the surface of the problem, we need to invest in complete multi-media recordings for everybody to avoid unfair actions at the root itself. In cashless economy, we need complete multi-media recordings for influential persons at least to avoid misuse of the earning/spending information of others by them.

Author would like to request the readers to voice their opinions to their representatives in regulatory and governing bodies and various polling agencies / news channels to poll the public opinion on the proposed change.

6) References:

1. [Cashless Economy - Samir]

CASHLESS ECONOMY VIA COMPLETE DIGITALLY CONNECTED WORLD IS THE ONLYWAY OUT FOR US

-Samir Srivastava; srivastava_samir@hotmail.com;

-Available on same web sites/blogs along with this paper.

2. Various web-sites such as www.wikipedia.org, www.ietf.org, www.itu.org, www.ieee.org, www.openpgp.org for details about different terms such as internet, DNA, PGP, HTTPS,MAC used in the paper.